Smashing the stack protector for fun and profit B Bierbaumer, J Kirsch, T Kittel, A Francillon, A Zarras ICT Systems Security and Privacy Protection: 33rd IFIP TC 11 International …, 2018 | 1581 | 2018 |
A Large-Scale Analysis of the Security of Embedded Firmwares A Costin, J Zaddach, A Francillon, D Balzarotti USENIX Security Symposium, 95-110, 2014 | 604 | 2014 |
Relay attacks on passive keyless entry and start systems in modern cars A Francillon, B Danev, S Capkun NDSS 2011, Proceedings of the Network and Distributed System Security Symposium, 2011 | 588 | 2011 |
SMART: Secure and Minimal Architecture for (establishing a dynamic) Root of Trust K El Defrawy, A Francillon, D Perito, G Tsudik Proceedings of the Network & Distributed System Security Symposium (NDSS …, 2012 | 484 | 2012 |
AVATAR: A framework to support dynamic security analysis of embedded systems' firmwares J Zaddach, L Bruno, A Francillon, D Balzarotti NDSS 2014, Proceedings of the Network and Distributed System Security Symposium, 2014 | 449 | 2014 |
Code injection attacks on Harvard-architecture devices A Francillon, C Castelluccia Proceedings of the 15th ACM conference on Computer and communications …, 2008 | 391 | 2008 |
Ghost in the Air (Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices A Costin, A Francillon black hat USA 1, 1-12, 2012 | 335 | 2012 |
Analysis of the communication between colluding applications on modern smartphones C Marforio, H Ritzdorf, A Francillon, S Capkun Proceedings of the 28th Annual Computer Security Applications Conference, 51-60, 2012 | 328* | 2012 |
EphPub: Toward Robust Ephemeral Publishing C Castelluccia, E De Cristofaro, A Francillon, MA Kaafar 19th International Conference on Network Protocols (ICNP),, 2011 | 294 | 2011 |
On the difficulty of software-based attestation of embedded devices C Castelluccia, A Francillon, D Perito, C Soriente Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 292 | 2009 |
Automated dynamic firmware analysis at scale: a case study on embedded web interfaces A Costin, A Zarras, A Francillon Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 277 | 2016 |
What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices M Muench, J Stijohann, F Kargl, A Francillon, D Balzarotti Network and Distributed System Security Symposium (NDSS'18), 2018 | 258 | 2018 |
Reverse engineering Intel last-level cache complex addressing using performance counters C Maurice, N Le Scouarnec, C Neumann, O Heen, A Francillon International Symposium on Recent Advances in Intrusion Detection, 48-65, 2015 | 252 | 2015 |
Screaming channels: When electromagnetic side channels meet radio transceivers G Camurati, S Poeplau, M Muench, T Hayes, A Francillon Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 182 | 2018 |
A minimalist approach to remote attestation A Francillon, Q Nguyen, KB Rasmussen, G Tsudik Proceedings of Design, Automation and Test in Europe (DATE), Dresden, Germany, 2014 | 176 | 2014 |
Symbolic execution with SymCC: Don't interpret, compile! S Poeplau, A Francillon 29th USENIX Security Symposium (USENIX Security 20), 181-198, 2020 | 167 | 2020 |
Avatar²: A Multi-target Orchestration Platform M Muench, D Nisi, A Francillon, D Balzarotti Workshop on Binary Analysis Research (BAR) 2018 (co-located with NDSS 18), 2018 | 162 | 2018 |
C5: Cross-Cores Cache Covert Channel C Maurice, C Neumann, O Heen, A Francillon Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), 2015 | 154 | 2015 |
Toward the Analysis of Embedded Firmware through Automated Re-hosting E Gustafson, M Muench, C Spensky, N Redini, A Machiry, Y Fratantonio, ... 22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019 | 140 | 2019 |
Defending embedded systems against control flow attacks A Francillon, D Perito, C Castelluccia Proceedings of the first ACM workshop on Secure execution of untrusted code …, 2009 | 133 | 2009 |